Yongle Hao

Orcid: 0000-0001-8146-9975

According to our database1, Yongle Hao authored at least 20 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Primal-dual active set method for evaluating American put options on zero-coupon bonds.
Comput. Appl. Math., 2024

2022
Semi-implicit FEM for the valuation of American options under the Heston model.
Comput. Appl. Math., March, 2022

Numerical solutions for Helmholtz equation with stochastic interface based on PML method.
J. Comput. Appl. Math., 2022

2020
Survey of Cyberspace Resources Scanning and Analyzing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

2018
A Robust Numerical Method for the Random Interface Grating Problem via Shape Calculus, Weak Galerkin Method, and Low-Rank Approximation.
J. Sci. Comput., 2018

Computation of moments for Maxwell's equations with random interfaces via pivoted low-rank approximation.
J. Comput. Phys., 2018

Multi-level Monte Carlo weak Galerkin method with nested meshes for stochastic Brinkman problem.
J. Comput. Appl. Math., 2018

2017
Improved traffic detection with support vector machine based on restricted Boltzmann machine.
Soft Comput., 2017

WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
Soft Comput., 2017

A Novel Algorithm for Feature Selection Used in Intrusion Detection.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A Security Vulnerability Threat Classification Method.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Mocov: Model Based Fuzzing Through Coverage Guided Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
A taint based approach for automatic reverse engineering of gray-box file formats.
Soft Comput., 2016

2015
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm.
Proceedings of the 10th International Conference on P2P, 2015

2014
JavaScript Malicious Codes Analysis Based on Naive Bayes Classification.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

OpenSSL HeartBleed: Security Management of Implements of Basic Protocols.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Synthesis Algorithm of Homology Detection Based on AHP.
Int. J. Comput. Intell. Syst., 2013

2011
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010


  Loading...